| CVE-2025-8677 | |
| CVE-2025-40780 | |
| CVE-2025-40778 | |
| CVE-2025-40775 | |
| CVE-2024-12705 | |
| CVE-2024-11187 | |
| Memory Leak | |
| Reachable Assertion | |
| Allocation of Resources Without Limits or Throttling | |
| Memory Leak | |
| CVE-2022-3080 | |
| CVE-2024-1975 | |
| CVE-2023-5679 | |
| Allocation of Resources Without Limits or Throttling | |
| Out-of-bounds Read | |
| CVE-2022-2795 | |
| Memory Leak | |
| CVE-2024-0760 | |
| Reachable Assertion | |
| Improper Input Validation | |
| CVE-2024-4076 | |
| CVE-2023-50868 | |
| CVE-2024-1737 | |
| Use After Free | |
| Improper Resource Shutdown or Release | |
| CVE-2022-3736 | |
| Reachable Assertion | |
| CVE-2023-4408 | |
| Improper Privilege Management | |
| Reachable Assertion | |
| CVE-2023-5680 | |
| Improper Resource Shutdown or Release | |
| HTTP Request Smuggling | |
| Out-of-bounds Write | |
| Reachable Assertion | |
| CVE-2021-25219 | |
| Reachable Assertion | |
| Improper Privilege Management | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Race Condition | |
| Buffer Overflow | |
| Resource Exhaustion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Resource Exhaustion | |
| Use of a Broken or Risky Cryptographic Algorithm | |
| Insufficient Verification of Data Authenticity | |
| Reachable Assertion | |
| Reachable Assertion | |
| Reachable Assertion | |
| Incorrect Permission Assignment for Critical Resource | |
| Allocation of Resources Without Limits or Throttling | |
| Use After Free | |
| Improper Input Validation | |
| Improper Input Validation | |
| Reachable Assertion | |
| Information Exposure | |
| Improper Input Validation | |
| Reachable Assertion | |
| Missing Release of Resource after Effective Lifetime | |
| Reachable Assertion | |